# cryptsetup 1.4.3 processing "cryptsetup --debug --key-file=- luksOpen /secure secure_unformatted" # Running command luksOpen. # Locking memory. # Allocating crypt device /secure context. # Not a block device, using free loop device /dev/loop0. # Trying to open and read device /dev/loop0. # Initialising device-mapper backend, UDEV is enabled. # Detected dm-crypt version 1.11.0, dm-ioctl version 4.23.0. # Trying to load LUKS1 crypt type from device /dev/loop0. # Crypto backend (gcrypt 1.5.0) initialized. # Reading LUKS header of size 1024 from device /dev/loop0 # Timeout set to 0 miliseconds. # Password retry count set to 3. # Password verification disabled. # Iteration time set to 1000 miliseconds. # Password retry count set to 1. # Activating volume secure_unformatted [keyslot -1] using keyfile -. # dm status secure_unformatted OF [16384] (*1) # Interactive passphrase entry requested. Enter passphrase: # Trying to open key slot 0 [ACTIVE_LAST]. # Reading key slot 0 area. # DM-UUID is CRYPT-TEMP-temporary-cryptsetup-3329 # Udev cookie 0xd4d2476 (semid 65536) created # Udev cookie 0xd4d2476 (semid 65536) incremented to 1 # Udev cookie 0xd4d2476 (semid 65536) incremented to 2 # Udev cookie 0xd4d2476 (semid 65536) assigned to CREATE task(0) with flags DISABLE_SUBSYSTEM_RULES DISABLE_DISK_RULES DISABLE_OTHER_RULES (0xe) # dm create temporary-cryptsetup-3329 CRYPT-TEMP-temporary-cryptsetup-3329 OF [16384] (*1) # dm reload temporary-cryptsetup-3329 OFRW [16384] (*1) device-mapper: reload ioctl on failed: No such file or directory # # Udev cookie 0xd4d2476 (semid 65536) decremented to 1 # Udev cookie 0xd4d2476 (semid 65536) incremented to 2 # Udev cookie 0xd4d2476 (semid 65536) assigned to REMOVE task(2) with flags DISABLE_SUBSYSTEM_RULES DISABLE_DISK_RULES DISABLE_OTHER_RULES (0xe) # dm remove temporary-cryptsetup-3329 OFRW [16384] (*1) # temporary-cryptsetup-3329: Stacking NODE_DEL [verify_udev] # Udev cookie 0xd4d2476 (semid 65536) decremented to 1 # Udev cookie 0xd4d2476 (semid 65536) waiting for zero # Udev cookie 0xd4d2476 (semid 65536) destroyed # temporary-cryptsetup-3329: Processing NODE_DEL [verify_udev] Failed to setup dm-crypt key mapping for device /dev/loop0. Check that kernel supports aes-cbc-essiv:sha256 cipher (check syslog for more info). Failed to read from key storage. # Releasing crypt device /dev/loop0 context. # Releasing device-mapper backend. # Unlocking memory. Command failed with code 5: Failed to read from key storage.